US20130238873A1 - Method for clearing computer data and computer - Google Patents

Method for clearing computer data and computer Download PDF

Info

Publication number
US20130238873A1
US20130238873A1 US13/823,606 US201113823606A US2013238873A1 US 20130238873 A1 US20130238873 A1 US 20130238873A1 US 201113823606 A US201113823606 A US 201113823606A US 2013238873 A1 US2013238873 A1 US 2013238873A1
Authority
US
United States
Prior art keywords
computer
command
data
password
clearing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/823,606
Inventor
Hongqi Yu
Xin Xu
Jia Wu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
RUNCORE HIGH-TECH Co Ltd
RUNCORE HIGH Tech CO Ltd
Original Assignee
RUNCORE HIGH Tech CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by RUNCORE HIGH Tech CO Ltd filed Critical RUNCORE HIGH Tech CO Ltd
Assigned to RUNCORE HIGH-TECH CO., LTD. reassignment RUNCORE HIGH-TECH CO., LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: WU, Jia, XU, XIN, YU, HONGQI
Publication of US20130238873A1 publication Critical patent/US20130238873A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0652Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Definitions

  • the disclosure relates to the field of computer technologies, and more particularly to a method for clearing computer data and a computer.
  • Memory errors can be prevented by using top-quality hard disks as accessories, utilizing drop-resistant shockproof protective devices, and so on.
  • Passwords can be set on computers to prevent illegal reading. However, all kinds of passwords can be deciphered over time. Therefore, even if passwords are set on a computer, data will still be read and become non-confidential after the computer is stolen and the passwords are deciphered because the passwords are unique and the data cannot be cleared in time.
  • the disclosure aims to provide a method for clearing computer data and a computer to solve the problem that data will still be read after the computer is stolen because the data cannot be cleared in time.
  • a method for clearing computer data comprising: a computer receiving a command for clearing data through a wireless network, or sensing that the computer is disassembled and then generating the command for clearing data; the computer clearing data in a memory of the computer.
  • the method further comprises: the computer outputting a prompt of matching a password, and determining whether a received password is matched correctly; logging in a system if the received password is matched correctly; if the received password is not matched correctly, sending a request for clearing data through the wireless network to a user terminal; the user terminal sending the command for clearing data to the computer after acknowledging the request for clearing data.
  • the method further comprises: the computer receiving a power-on signal and sending a request of whether to perform power-on through the wireless network; the computer determining whether a power-on command is received within a predetermined time period, and executing the power-on command and starting the computer if the computer receives the power-on command within the predetermined time period; turning off a power supply if the computer fails to receive the power-on command within the predetermined time period.
  • the memory is a solid state disk or a mechanical hard disk.
  • the computer receives the command for clearing data through a short message or a mail.
  • a computer comprising: a memory, a wireless module, a control chip, a sensor and a power supply, wherein the control chip is connected to the memory, the wireless module, the sensor, and the power supply respectively, and responds to a command for clearing data from the wireless module or the sensor to clear data in the memory; the wireless module is configured to receive the command for clearing data from a wireless network; the sensor is configured to sense that the computer is disassembled and then generate the command for clearing data; the memory, the wireless module, the control chip, the sensor and the power supply are packaged in the computer.
  • the memory is a solid state disk or a mechanical hard disk.
  • the wireless module is a communication module which applies Global System for Mobile Communications (GSM), Code Division Multiple Access (CDMA), Wireless Fidelity (WiFi) or 3rd Generation (3G) communication technology.
  • GSM Global System for Mobile Communications
  • CDMA Code Division Multiple Access
  • WiFi Wireless Fidelity
  • 3G 3rd Generation
  • control chip further comprises: a password matching module configured to, before the wireless module receives the command for clearing data, control the computer to output a prompt of matching a password, and according to the result of matching the password, control the computer to log in a system or control the wireless module to send a request for clearing data to a user terminal, wherein the user terminal, after acknowledging the request for clear data, sends the command for clearing data to the computer.
  • a password matching module configured to, before the wireless module receives the command for clearing data, control the computer to output a prompt of matching a password, and according to the result of matching the password, control the computer to log in a system or control the wireless module to send a request for clearing data to a user terminal, wherein the user terminal, after acknowledging the request for clear data, sends the command for clearing data to the computer.
  • control chip further comprises: a power supply control module configured to, after the computer receives a power-on signal and before the password matching module outputs the prompt for matching a password, send a request of whether to perform power-on through the wireless module; and choose to execute the power-on command or turn off the power supply within a predetermined time period according to a received power-on command.
  • a power supply control module configured to, after the computer receives a power-on signal and before the password matching module outputs the prompt for matching a password, send a request of whether to perform power-on through the wireless module; and choose to execute the power-on command or turn off the power supply within a predetermined time period according to a received power-on command.
  • the computer is a desktop computer or a laptop.
  • the computer is powered on and started only upon obtaining a starting authorization of a user, so as to improve the confidentiality of computer data;
  • the data can be cleared or be not cleared according to whether it is successful to match a password, or the data can be cleared after obtaining a user command when mismatching the password. Therefore, the confidentiality of user data is improved, and the user data is kept confidential and is prevented from being leaked.
  • FIG. 1 illustrates a diagram illustrating an internal structure of a computer in the first embodiment
  • FIG. 2 illustrates a flowchart of an access control method of a computer memory of the second embodiment
  • FIG. 3 illustrates a flowchart of an access control method of a computer memory of the third embodiment
  • FIG. 4 illustrates a flowchart of an access control method of a computer memory of the fourth embodiment
  • FIG. 5 illustrates a flowchart of an access control method of a computer memory of the fifth embodiment
  • FIG. 6 illustrates a structural diagram of a laptop in the sixth embodiment.
  • FIG. 1 is a structural diagram of a computer in the first embodiment of the disclosure.
  • the computer comprises: a control chip 10 , a wireless module 12 , a hard disk 14 , a sensor 16 and a power supply 18 .
  • the control chip 10 can be integrated on the main board of the computer and connected to the wireless module 12 , the hard disk 14 , the sensor 16 and the power supply 18 via corresponding data wires.
  • the wireless module 12 can apply communication technologies including GSM, CDMA, WiFi or 3G etc.
  • the hard disk 14 can apply an SSD (Solid State Disk) or a mechanical hard disk etc.
  • the power supply 18 can also apply a storage battery. These components are packaged in the computer. If the computer is disassembled without authorization, the sensor 16 will send a trigger signal for clearing data to the control chip 10 .
  • a data clearing process performed based on the computer in the first embodiment will be described in details below through the second embodiment. As shown in FIG. 1 and FIG. 2 , the process comprises the following steps:
  • Step 20 the control chip 10 receives a command for clearing data.
  • the control chip 10 receives a command of the wireless module 12 or a command of the sensor 16 and identifies the command as a command for clearing data.
  • Step 22 the control chip 10 clears the data in the hard disk 14 .
  • control chip 10 After receiving the command, the control chip 10 clears the data in the hard disk 14 .
  • the computer is able to clear data therein after obtaining a command for clearing data, so as to keep user data confidential and prevent the user data from being leaked.
  • the third embodiment will be explained first, comprising the following steps as shown in FIG. 1 and FIG. 3 :
  • Step 30 the computer is started and the control chip 10 receives a command signal for clearing data from a user through the wireless module 12 .
  • the user can send the command for clearing data via a network terminal, such as a cell phone and a computer connected to the Internet etc.
  • a network terminal such as a cell phone and a computer connected to the Internet etc.
  • the wireless module 12 will receive a message from a network, such as a short message, a packet data command or a mail etc., so as to obtain the command for clearing data from the user.
  • Step 32 the control chip 10 starts the hard disk 14 and executes an operation of clearing the data.
  • the user can send a command for clearing data through a network terminal such as a cell phone and a computer connected to the Internet etc., after the computer is lost.
  • the wireless module 12 will receive a message from a network, such as a short message, a packet data command or a mail etc., so as to obtain the command for clearing data from the user and clear the data in the hard disk 14 , so as to keep user data confidential and prevent the user data from being leaked.
  • the proposal comprises the following steps as shown in FIG. 1 and FIG. 4 :
  • Step 40 after sensing that the computer is disassembled, the sensor 16 sends a signal for clearing data to a user terminal; after acknowledging the request for clearing data, the user terminal sends the command for clearing data to the computer.
  • the user terminal in the present step can be a cell phone terminal.
  • the cell phone terminal of the user can send a command for clearing data to the computer.
  • the request for clearing data can be received through a short message.
  • the control chip 10 , the wireless module 12 , the hard disk 14 , the sensor 16 and the power supply 18 are packaged in the computer. After sensing that the computer is disassembled, the sensor 16 sends a trigger signal for clearing data to the control chip 10 .
  • Step 42 after receiving the trigger signal, the control chip 10 clears the data in the hard disk 14 .
  • control chip 10 can obtain the command for clearing data and clears the data in the hard disk 14 so as to keep user data confidential and prevent the user data from being leaked.
  • a starting authorization of a user can be further obtained after the computer is started, which improves confidentiality of computer data.
  • the data can be cleared or be not cleared according to whether it is successful to match a password or, the data is cleared by applying the proposal in the third embodiment if it is unsuccessful to match the password, which will be described below through the fifth embodiment, comprising the following steps as shown in FIG. 5 :
  • Step 500 starting a computer and the wireless module 12 sends a command of whether to be started.
  • the wireless module 12 can send a message, such as a short message, a packet data command or a mail etc., to the network to remind the user whether to start the computer or not.
  • a message such as a short message, a packet data command or a mail etc.
  • Step 502 the wireless module 12 determines whether a starting command of the user is received within a predetermined time period; if yes, performing Step 504 and starting the computer; otherwise, waiting for the next triggering and returning to Step 500 ;
  • Step 504 starting the computer and determining whether a password inputted is correctly; if yes, performing Step 506 and the computer is started; otherwise, performing Step 508 or Step 512 ;
  • Step 508 the control chip 10 sends information of clearing data to the user through the wireless module 12 ;
  • the wireless module 12 can send the information of clearing data to the user through a short message, a packet data command or a mail etc.
  • the user After receiving the information, the user can return a command indicating whether to clear data or not through a network terminal, such as a cell phone and a computer connected to the Internet etc.
  • a network terminal such as a cell phone and a computer connected to the Internet etc.
  • Step 510 the control chip 10 determines whether or not to receive a command signal from the user through the wireless module 12 within a predetermined time period; if the command signal is received, performing Step 512 ; otherwise, performing Step 514 .
  • the wireless module 12 will receive a message from the network, such as a short message, a packet data command or a mail etc., so as to obtain whether the user has sent the command for clearing data.
  • a message from the network such as a short message, a packet data command or a mail etc.
  • Step 512 the control chip 10 starts the hard disk 14 and executes an operation of clearing data.
  • wrong passwords may be inputted and the user can also choose to return a command, such as logging in the system forcibly, to remotely assist other users to use the computer.
  • Step 514 the control chip 10 turns off the computer.
  • the computer is powered on and started only after obtaining a starting authorization of a user, so as to improve confidentiality of computer data; and further, the data can be cleared or be not cleared according to whether it is successful to match a password, or the data can be cleared after obtaining a user command if it is unsuccessful to match the password. Therefore, the confidentiality of user data is improved, and the user data is kept confidential and is prevented from being leaked.
  • the method of the embodiment can be integrated in each component in the first embodiment, for example. These components can be installed in a small server, a desktop computer or a mobile laptop.
  • a structure of a laptop will be described in details below through the sixth embodiment. As shown in FIG. 6 , the structure comprises: a hard disk 14 , a wireless module 12 , a control chip 10 , a sensor 16 and a power supply 18 .
  • the control chip 10 is connected to the hard disk 14 , the wireless module 12 , the sensor 16 and the power supply 18 respectively and responds to a command for clearing data from the wireless module 12 or the sensor 16 to clear the data in the hard disk 14 .
  • the wireless module 12 is configured to receive the command for clearing data in the wireless network.
  • the sensor 16 is configured to sense that the laptop is disassembled, and then generate the command for clearing data.
  • the hard disk 14 is an SSD or a mechanical hard disk.
  • the wireless module 12 is a communication module which applies communication technologies of GSM, CDMA, WiFi or 3G.
  • the control chip 10 further comprises a password matching module 100 .
  • the password matching module 100 controls the laptop to output a prompt of matching passwords, and determines whether received passwords are matched correctly; if the received passwords are matched correctly, the password matching module 100 controls the laptop to log in the system; otherwise, the password matching module 100 controls the wireless module 12 to send the command for clearing data.
  • the control chip 10 further comprises a power supply control module 102 .
  • the power supply control module 102 sends a power-on request (i.e, a request of whether to perform power-on) through the wireless module 12 ; and then the power supply control module 102 determines whether a power-on command is received within a predetermined time period; if the power-on command is received within a predetermined time period, then the power supply control module 102 executes the power-on command and starts the laptop; otherwise, the power supply control module 102 turns off the power supply.
  • the power-on command here can be a power-on command returned by the user terminal to the computer after receiving the power-on request of the computer and acknowledging the power-on.
  • the computer is powered on and started only upon obtaining a starting authorization of a user, so as to improve confidentiality of computer data; and the data can be cleared or be not cleared according to whether it is successful to match a password, or the data can be cleared after obtaining a user command if it is unsuccessful to match the password. Therefore, the confidentiality of user data is improved, and the user data is kept confidential and is prevented from being leaked.
  • modules or steps of the disclosure may be implemented by general computing devices and centralized in a single computing device or distributed in a network consisting of multiple computing devices.
  • the modules or steps may be implemented by program codes executable by the computing devices, so that they may be stored in a storage device and executed by the computing device, or respectively made into integrated circuit modules or a single integrated circuit module.
  • the disclosure is not limited to any specific combination of hardware and software.

Abstract

The disclosure provides a method for clearing computer data and a computer. The method comprises: a computer receiving a command for clearing data through a wireless network, or sensing that the computer is disassembled and then generating the command for clearing data; and the computer clearing data in the memory of the computer. In the disclosure, the computer is powered on and started only upon obtaining a starting authorization of a user, so as to improve confidentiality of computer data; and further, the data can be cleared or be not cleared according to whether it is successful to match a password, or the data can be cleared after obtaining a command of a user if it is not successful to match the password. Therefore, the confidentiality of user data is improved, and the user data is kept confidential and is prevented from being leaked.

Description

    TECHNICAL FIELD OF THE INVENTION
  • The disclosure relates to the field of computer technologies, and more particularly to a method for clearing computer data and a computer.
  • BACKGROUND OF THE INVENTION
  • With the increasing importance of computers' role in our daily life, people are becoming more and more computer-dependent. Due to the convenient and efficient use of computers, many important data are stored in computers.
  • When data are stored in the computer, the hidden troubles of the security may occur. Generally, there are two kinds of hidden troubles of data security: the memory errors and the illegal reading.
  • Memory errors can be prevented by using top-quality hard disks as accessories, utilizing drop-resistant shockproof protective devices, and so on.
  • Most computer users, no matter individuals or enterprises, lack data safety awareness and do not have data protection with regard to illegal reading.
  • So if laptops which preserve the relevant material of company are stolen, it takes a great deal of efforts for relevant authorities to make up.
  • Passwords can be set on computers to prevent illegal reading. However, all kinds of passwords can be deciphered over time. Therefore, even if passwords are set on a computer, data will still be read and become non-confidential after the computer is stolen and the passwords are deciphered because the passwords are unique and the data cannot be cleared in time.
  • SUMMARY OF THE INVENTION
  • The disclosure aims to provide a method for clearing computer data and a computer to solve the problem that data will still be read after the computer is stolen because the data cannot be cleared in time.
  • According to an aspect of the disclosure, a method for clearing computer data is provided, comprising: a computer receiving a command for clearing data through a wireless network, or sensing that the computer is disassembled and then generating the command for clearing data; the computer clearing data in a memory of the computer.
  • Preferably, before the computer receives the command for clearing data through the wireless network, the method further comprises: the computer outputting a prompt of matching a password, and determining whether a received password is matched correctly; logging in a system if the received password is matched correctly; if the received password is not matched correctly, sending a request for clearing data through the wireless network to a user terminal; the user terminal sending the command for clearing data to the computer after acknowledging the request for clearing data.
  • Preferably, before the computer outputs the prompt of matching a password, the method further comprises: the computer receiving a power-on signal and sending a request of whether to perform power-on through the wireless network; the computer determining whether a power-on command is received within a predetermined time period, and executing the power-on command and starting the computer if the computer receives the power-on command within the predetermined time period; turning off a power supply if the computer fails to receive the power-on command within the predetermined time period.
  • Preferably, the memory is a solid state disk or a mechanical hard disk.
  • Preferably, the computer receives the command for clearing data through a short message or a mail.
  • According to another aspect of the disclosure, a computer is provided, comprising: a memory, a wireless module, a control chip, a sensor and a power supply, wherein the control chip is connected to the memory, the wireless module, the sensor, and the power supply respectively, and responds to a command for clearing data from the wireless module or the sensor to clear data in the memory; the wireless module is configured to receive the command for clearing data from a wireless network; the sensor is configured to sense that the computer is disassembled and then generate the command for clearing data; the memory, the wireless module, the control chip, the sensor and the power supply are packaged in the computer.
  • Preferably, the memory is a solid state disk or a mechanical hard disk.
  • Preferably, the wireless module is a communication module which applies Global System for Mobile Communications (GSM), Code Division Multiple Access (CDMA), Wireless Fidelity (WiFi) or 3rd Generation (3G) communication technology.
  • Preferably, the control chip further comprises: a password matching module configured to, before the wireless module receives the command for clearing data, control the computer to output a prompt of matching a password, and according to the result of matching the password, control the computer to log in a system or control the wireless module to send a request for clearing data to a user terminal, wherein the user terminal, after acknowledging the request for clear data, sends the command for clearing data to the computer.
  • Preferably, the control chip further comprises: a power supply control module configured to, after the computer receives a power-on signal and before the password matching module outputs the prompt for matching a password, send a request of whether to perform power-on through the wireless module; and choose to execute the power-on command or turn off the power supply within a predetermined time period according to a received power-on command.
  • Preferably, the computer is a desktop computer or a laptop.
  • In the embodiments above, the computer is powered on and started only upon obtaining a starting authorization of a user, so as to improve the confidentiality of computer data; Besides, the data can be cleared or be not cleared according to whether it is successful to match a password, or the data can be cleared after obtaining a user command when mismatching the password. Therefore, the confidentiality of user data is improved, and the user data is kept confidential and is prevented from being leaked.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The accompanying drawings are used for promoting the understanding of the disclosure which constitutes a part of the present application. The exemplary embodiments of the disclosure and the illustrations thereof are used for explaining the disclosure, and do not make any improper limitation to the disclosure. In the accompanying drawings:
  • FIG. 1 illustrates a diagram illustrating an internal structure of a computer in the first embodiment;
  • FIG. 2 illustrates a flowchart of an access control method of a computer memory of the second embodiment;
  • FIG. 3 illustrates a flowchart of an access control method of a computer memory of the third embodiment;
  • FIG. 4 illustrates a flowchart of an access control method of a computer memory of the fourth embodiment;
  • FIG. 5 illustrates a flowchart of an access control method of a computer memory of the fifth embodiment; and
  • FIG. 6 illustrates a structural diagram of a laptop in the sixth embodiment.
  • DETAILED DESCRIPTION OF THE EMBODIMENTS
  • The disclosure will be described in details below with reference to the accompanying drawings and in combination with the embodiments. The proposals in the embodiments of the disclosure can clear data in a laptop computer in time.
  • As shown in FIG. 1 which is a structural diagram of a computer in the first embodiment of the disclosure. The computer comprises: a control chip 10, a wireless module 12, a hard disk 14, a sensor 16 and a power supply 18.
  • The control chip 10 can be integrated on the main board of the computer and connected to the wireless module 12, the hard disk 14, the sensor 16 and the power supply 18 via corresponding data wires. The wireless module 12 can apply communication technologies including GSM, CDMA, WiFi or 3G etc. The hard disk 14 can apply an SSD (Solid State Disk) or a mechanical hard disk etc. The power supply 18 can also apply a storage battery. These components are packaged in the computer. If the computer is disassembled without authorization, the sensor 16 will send a trigger signal for clearing data to the control chip 10.
  • A data clearing process performed based on the computer in the first embodiment will be described in details below through the second embodiment. As shown in FIG. 1 and FIG. 2, the process comprises the following steps:
  • Step 20: the control chip 10 receives a command for clearing data.
  • The control chip 10 receives a command of the wireless module 12 or a command of the sensor 16 and identifies the command as a command for clearing data.
  • Step 22: the control chip 10 clears the data in the hard disk 14.
  • After receiving the command, the control chip 10 clears the data in the hard disk 14.
  • Through the proposal above, after a user loses a computer, the computer is able to clear data therein after obtaining a command for clearing data, so as to keep user data confidential and prevent the user data from being leaked.
  • Two situations of clearing data in the first embodiment will be explained below through the third embodiment and the fourth embodiment. The third embodiment will be explained first, comprising the following steps as shown in FIG. 1 and FIG. 3:
  • Step 30: the computer is started and the control chip 10 receives a command signal for clearing data from a user through the wireless module 12.
  • The user can send the command for clearing data via a network terminal, such as a cell phone and a computer connected to the Internet etc. After the computer is started, the wireless module 12 will receive a message from a network, such as a short message, a packet data command or a mail etc., so as to obtain the command for clearing data from the user.
  • Step 32: the control chip 10 starts the hard disk 14 and executes an operation of clearing the data.
  • In above process of clearing the data, the user can send a command for clearing data through a network terminal such as a cell phone and a computer connected to the Internet etc., after the computer is lost. After the computer is started, the wireless module 12 will receive a message from a network, such as a short message, a packet data command or a mail etc., so as to obtain the command for clearing data from the user and clear the data in the hard disk 14, so as to keep user data confidential and prevent the user data from being leaked.
  • After the computer is lost, the theft will disassemble the computer. In order to prevent automatic data consumption, the theft will disassemble the computer to obtain the data therein. In order to prevent data in the computer from being leaked, the data is cleared according to the proposal in the fourth embodiment, wherein the proposal comprises the following steps as shown in FIG. 1 and FIG. 4:
  • Step 40: after sensing that the computer is disassembled, the sensor 16 sends a signal for clearing data to a user terminal; after acknowledging the request for clearing data, the user terminal sends the command for clearing data to the computer.
  • The user terminal in the present step can be a cell phone terminal. After receiving the request for clearing data, the cell phone terminal of the user can send a command for clearing data to the computer. Here, the request for clearing data can be received through a short message.
  • The control chip 10, the wireless module 12, the hard disk 14, the sensor 16 and the power supply 18 are packaged in the computer. After sensing that the computer is disassembled, the sensor 16 sends a trigger signal for clearing data to the control chip 10.
  • Step 42: after receiving the trigger signal, the control chip 10 clears the data in the hard disk 14.
  • Through the proposal in the fourth embodiment, the control chip 10 can obtain the command for clearing data and clears the data in the hard disk 14 so as to keep user data confidential and prevent the user data from being leaked.
  • In the embodiment above, a starting authorization of a user can be further obtained after the computer is started, which improves confidentiality of computer data. Further, the data can be cleared or be not cleared according to whether it is successful to match a password or, the data is cleared by applying the proposal in the third embodiment if it is unsuccessful to match the password, which will be described below through the fifth embodiment, comprising the following steps as shown in FIG. 5:
  • Step 500: starting a computer and the wireless module 12 sends a command of whether to be started.
  • The wireless module 12 can send a message, such as a short message, a packet data command or a mail etc., to the network to remind the user whether to start the computer or not.
  • Step 502: the wireless module 12 determines whether a starting command of the user is received within a predetermined time period; if yes, performing Step 504 and starting the computer; otherwise, waiting for the next triggering and returning to Step 500;
  • Step 504: starting the computer and determining whether a password inputted is correctly; if yes, performing Step 506 and the computer is started; otherwise, performing Step 508 or Step 512;
  • Step 508: the control chip 10 sends information of clearing data to the user through the wireless module 12;
  • The wireless module 12 can send the information of clearing data to the user through a short message, a packet data command or a mail etc.
  • After receiving the information, the user can return a command indicating whether to clear data or not through a network terminal, such as a cell phone and a computer connected to the Internet etc.
  • Step 510: the control chip 10 determines whether or not to receive a command signal from the user through the wireless module 12 within a predetermined time period; if the command signal is received, performing Step 512; otherwise, performing Step 514.
  • After Step 508, the wireless module 12 will receive a message from the network, such as a short message, a packet data command or a mail etc., so as to obtain whether the user has sent the command for clearing data.
  • Step 512: the control chip 10 starts the hard disk 14 and executes an operation of clearing data.
  • Preferably, when other user authorized by a user uses the computer, wrong passwords may be inputted and the user can also choose to return a command, such as logging in the system forcibly, to remotely assist other users to use the computer.
  • Step 514: the control chip 10 turns off the computer.
  • In the embodiment above, the computer is powered on and started only after obtaining a starting authorization of a user, so as to improve confidentiality of computer data; and further, the data can be cleared or be not cleared according to whether it is successful to match a password, or the data can be cleared after obtaining a user command if it is unsuccessful to match the password. Therefore, the confidentiality of user data is improved, and the user data is kept confidential and is prevented from being leaked.
  • Each embodiment of the method of the disclosure has been described in details above. The method of the embodiment can be integrated in each component in the first embodiment, for example. These components can be installed in a small server, a desktop computer or a mobile laptop. A structure of a laptop will be described in details below through the sixth embodiment. As shown in FIG. 6, the structure comprises: a hard disk 14, a wireless module 12, a control chip 10, a sensor 16 and a power supply 18.
  • The control chip 10 is connected to the hard disk 14, the wireless module 12, the sensor 16 and the power supply 18 respectively and responds to a command for clearing data from the wireless module 12 or the sensor 16 to clear the data in the hard disk 14.
  • The wireless module 12 is configured to receive the command for clearing data in the wireless network.
  • The sensor 16 is configured to sense that the laptop is disassembled, and then generate the command for clearing data.
  • Preferably, the hard disk 14 is an SSD or a mechanical hard disk.
  • Preferably, the wireless module 12 is a communication module which applies communication technologies of GSM, CDMA, WiFi or 3G.
  • Preferably, the control chip 10 further comprises a password matching module 100. Before the command for clearing data is received via the wireless module 12, the password matching module 100 controls the laptop to output a prompt of matching passwords, and determines whether received passwords are matched correctly; if the received passwords are matched correctly, the password matching module 100 controls the laptop to log in the system; otherwise, the password matching module 100 controls the wireless module 12 to send the command for clearing data.
  • Preferably, the control chip 10 further comprises a power supply control module 102. After a power-on signal is received and before the password matching module 100 outputs the prompt for matching passwords, the power supply control module 102 sends a power-on request (i.e, a request of whether to perform power-on) through the wireless module 12; and then the power supply control module 102 determines whether a power-on command is received within a predetermined time period; if the power-on command is received within a predetermined time period, then the power supply control module 102 executes the power-on command and starts the laptop; otherwise, the power supply control module 102 turns off the power supply. The power-on command here can be a power-on command returned by the user terminal to the computer after receiving the power-on request of the computer and acknowledging the power-on.
  • In the embodiment above, the computer is powered on and started only upon obtaining a starting authorization of a user, so as to improve confidentiality of computer data; and the data can be cleared or be not cleared according to whether it is successful to match a password, or the data can be cleared after obtaining a user command if it is unsuccessful to match the password. Therefore, the confidentiality of user data is improved, and the user data is kept confidential and is prevented from being leaked.
  • Obviously, those skilled in the art should understand that the modules or steps of the disclosure may be implemented by general computing devices and centralized in a single computing device or distributed in a network consisting of multiple computing devices. Optionally, the modules or steps may be implemented by program codes executable by the computing devices, so that they may be stored in a storage device and executed by the computing device, or respectively made into integrated circuit modules or a single integrated circuit module. By doing so, the disclosure is not limited to any specific combination of hardware and software.
  • The above are only preferred embodiments of the disclosure and should not be used to limit the disclosure. For those skilled in the art, the disclosure may have various modifications and changes. Any modifications, equivalent replacements, improvements and the like within the spirit and principle of the disclosure shall fall within the scope of protection of the disclosure.

Claims (11)

What is claimed is:
1. A method for clearing computer data, comprising:
a computer receiving a command for clearing data through a wireless network, or sensing that the computer is disassembled and then generating the command for clearing data;
the computer clearing data in a memory of the computer.
2. The method according to claim 1, wherein before the computer receives the command for clearing data through the wireless network, the method further comprises:
the computer outputting a prompt of matching a password, and determining whether a received password is matched correctly;
logging in a system if the received password is matched correctly; if the received password is not matched correctly, sending a request for clearing data through the wireless network to a user terminal; the user terminal sending the command for clearing data to the computer after acknowledging the request for clearing data.
3. The method according to claim 2, wherein before the computer outputs the prompt of matching a password, the method further comprises:
the computer receiving a power-on signal and sending a request of whether to perform power-on through the wireless network;
the computer determining whether a power-on command is received within a predetermined time period, and executing the power-on command and starting the computer if the computer receives the power-on command within the predetermined time period; turning off a power supply if the computer fails to receive the power-on command within the predetermined time period.
4. The method according to claim 1, wherein the memory is a solid state disk or a mechanical hard disk.
5. The method according to claim 1, wherein the computer receives the command for clearing data through a short message or a mail.
6. A computer, comprising: a memory and a wireless module, and further comprising: a control chip, a sensor, and a power supply, wherein
the control chip is connected to the memory, the wireless module, the sensor, and the power supply respectively, and responds to a command for clearing data from the wireless module or the sensor to clear data in the memory;
the wireless module is configured to receive the command for clearing data from a wireless network:
the sensor is configured to sense that the computer is disassembled and then generate the command for clearing data;
the memory, the wireless module, the control chip, the sensor and the power supply are packaged in the computer.
7. The computer according to claim 6, wherein the memory is a solid state disk or a mechanical hard disk.
8. The computer according to claim 6, wherein the wireless module is a communication module which applies Global System for Mobile Communications (GSM), Code Division Multiple Access (CDMA), Wireless Fidelity (WiFi) or 3rd Generation (3G) communication technology.
9. The computer according to claim 6, wherein the control chip further comprises:
a password matching module configured to, before the wireless module receives the command for clearing data, control the computer to output a prompt of matching a password, and according to the result of matching the password, control the computer to log in a system or control the wireless module to send a request for clearing data to a user terminal, wherein the user terminal, after acknowledging the request for clear data, sends the command for clearing data to the computer.
10. The computer according to claim 9, wherein the control chip further comprises:
a power supply control module configured to, after the computer receives a power-on signal and before the password matching module outputs the prompt for matching a password, send a request of whether to perform power-on through the wireless module; and choose to execute the power-on command or turn off the power supply within a predetermined time period according to a received power-on command.
11. The computer according to claim 10, wherein the computer is a desktop computer or a laptop.
US13/823,606 2010-09-14 2011-07-21 Method for clearing computer data and computer Abandoned US20130238873A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201010280524.2 2010-09-14
CN201010280524.2A CN101916233B (en) 2010-09-14 2010-09-14 Computer and data elimination method thereof
PCT/CN2011/077450 WO2012034453A1 (en) 2010-09-14 2011-07-21 Method for clearing computer data and computer

Publications (1)

Publication Number Publication Date
US20130238873A1 true US20130238873A1 (en) 2013-09-12

Family

ID=43323749

Family Applications (1)

Application Number Title Priority Date Filing Date
US13/823,606 Abandoned US20130238873A1 (en) 2010-09-14 2011-07-21 Method for clearing computer data and computer

Country Status (6)

Country Link
US (1) US20130238873A1 (en)
EP (1) EP2618264A1 (en)
CN (1) CN101916233B (en)
HK (1) HK1151875A1 (en)
TW (1) TW201211759A (en)
WO (1) WO2012034453A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190228819A1 (en) * 2018-01-23 2019-07-25 Wistron Corporation Data management circuit
US20220292227A1 (en) * 2021-03-15 2022-09-15 Kabushiki Kaisha Toshiba Storage device

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101937404B (en) * 2010-09-07 2014-01-08 湖南源科高新技术有限公司 Control method for accessing computer memory and computer thereof
CN101916233B (en) * 2010-09-14 2013-04-10 湖南源科高新技术有限公司 Computer and data elimination method thereof
CN102682241B (en) * 2011-03-10 2016-10-19 研祥智能科技股份有限公司 A kind of electronic equipment and the guard method of data thereof and system
CN103902468B (en) * 2012-12-27 2018-02-23 华为技术有限公司 The data clearing method and device of storage system
CN106919863A (en) * 2017-02-21 2017-07-04 联想长风科技(北京)有限公司 A kind of self-destruction hard disk unit
CN107392038A (en) * 2017-08-31 2017-11-24 中国人民解放军海军医学研究所 The self-destruction control method of electric terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040030912A1 (en) * 2001-05-09 2004-02-12 Merkle James A. Systems and methods for the prevention of unauthorized use and manipulation of digital content
US20080173717A1 (en) * 1998-10-02 2008-07-24 Beepcard Ltd. Card for interaction with a computer
US20080252478A1 (en) * 2007-04-10 2008-10-16 Sony Corporation Electronic apparatus, remote controller and remote control system
US20090270126A1 (en) * 2008-04-24 2009-10-29 Hon Hai Precision Industry Co., Ltd. Mobile terminal having anti-theft function and anti-theft method
US20100049659A1 (en) * 2006-07-05 2010-02-25 Jean Cassone Method, device, server and system for identity authentication using biometrics
US8812875B1 (en) * 2010-04-12 2014-08-19 Stephen Melvin Virtual self-destruction of stored information

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007179575A (en) * 1996-05-14 2007-07-12 Fujitsu Ltd Remote security system of storage medium with security function
KR100296371B1 (en) * 1998-12-31 2001-08-07 최기주 Computer having security device
CN2389392Y (en) * 1999-08-27 2000-07-26 合肥中鼎电子有限责任公司 Identification instrument for evident code and hiden code used in anti-counterfeit
US7178031B1 (en) * 1999-11-08 2007-02-13 International Business Machines Corporation Wireless security access management for a portable data storage cartridge
CN2629123Y (en) * 2003-05-19 2004-07-28 西南交通大学 Remote controllable computer
GB2417399B (en) * 2004-08-12 2007-04-25 Samsung Electronics Co Ltd Reconfigurable key search engine
CN200979694Y (en) * 2006-08-21 2007-11-21 杭州小尔机电设计有限公司 A system used to delete the memory file of a portable computer with E-mail
CN101207869A (en) * 2006-12-18 2008-06-25 英业达股份有限公司 Data protection method
CN101369254A (en) * 2007-08-15 2009-02-18 联想(北京)有限公司 Data protection method and apparatus
US8099578B2 (en) * 2007-09-24 2012-01-17 Computer Associates Think, Inc. Method and system for finding scrolled regions within a tile cache
CN101572741A (en) * 2008-05-04 2009-11-04 英业达股份有限公司 Method for protecting mobile data
CN101753532B (en) * 2008-11-29 2013-09-25 华为数字技术(成都)有限公司 Method for controlling storage equipment, verifying device and storage device
CN101937404B (en) * 2010-09-07 2014-01-08 湖南源科高新技术有限公司 Control method for accessing computer memory and computer thereof
CN101916233B (en) * 2010-09-14 2013-04-10 湖南源科高新技术有限公司 Computer and data elimination method thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080173717A1 (en) * 1998-10-02 2008-07-24 Beepcard Ltd. Card for interaction with a computer
US20040030912A1 (en) * 2001-05-09 2004-02-12 Merkle James A. Systems and methods for the prevention of unauthorized use and manipulation of digital content
US20100049659A1 (en) * 2006-07-05 2010-02-25 Jean Cassone Method, device, server and system for identity authentication using biometrics
US20080252478A1 (en) * 2007-04-10 2008-10-16 Sony Corporation Electronic apparatus, remote controller and remote control system
US20090270126A1 (en) * 2008-04-24 2009-10-29 Hon Hai Precision Industry Co., Ltd. Mobile terminal having anti-theft function and anti-theft method
US8812875B1 (en) * 2010-04-12 2014-08-19 Stephen Melvin Virtual self-destruction of stored information

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190228819A1 (en) * 2018-01-23 2019-07-25 Wistron Corporation Data management circuit
US10672462B2 (en) * 2018-01-23 2020-06-02 Wistron Corporation Data management circuit
US20220292227A1 (en) * 2021-03-15 2022-09-15 Kabushiki Kaisha Toshiba Storage device

Also Published As

Publication number Publication date
HK1151875A1 (en) 2012-02-10
CN101916233A (en) 2010-12-15
TW201211759A (en) 2012-03-16
CN101916233B (en) 2013-04-10
WO2012034453A1 (en) 2012-03-22
EP2618264A1 (en) 2013-07-24

Similar Documents

Publication Publication Date Title
US20130238873A1 (en) Method for clearing computer data and computer
US10142331B2 (en) Authentication for application
US8795388B2 (en) Method, apparatus and system for remote management of mobile devices
US20050221800A1 (en) Method for remote lockdown of a mobile computer
JP2013516676A (en) Data protection device
EP2895982B1 (en) Hardware-enforced access protection
US9344896B2 (en) Method and system for delivering a command to a mobile device
WO2011088652A1 (en) Anti-theft mobile terminal and anti-theft method for mobile terminal
CN102075627A (en) Information prompting method and mobile terminal
EP1783614A4 (en) Management service device, backup service device, communication terminal device, and storage medium
CN101937404B (en) Control method for accessing computer memory and computer thereof
CN103582184A (en) Double-card smart phone high in safety performance
CN101888442A (en) Security management method for mobile terminal and mobile terminal
US8504810B2 (en) Remote PC bootup via a handheld communication device
CN102685326A (en) Message encryption method and device and mobile terminal
US7895662B1 (en) Systems and methods for the remote deletion of pre-flagged data
CN102568555A (en) USB (Universal Serial Bus) memory disc based on mobile module and remote management method thereof
US8850559B2 (en) Security method of a portable device
CN202472630U (en) USB (universal serial bus) memory disc based on mobile module
CN107438078B (en) Application safety protection system and method
JP2011211320A (en) Method of deleting secret information, secret information deleting device, and program for the same
US20120254572A1 (en) Information terminal and security management method
CN103269483A (en) Multi-mode activation system and method of OOAC (object-oriented access control) mobile phone token

Legal Events

Date Code Title Description
AS Assignment

Owner name: RUNCORE HIGH-TECH CO., LTD., CHINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YU, HONGQI;XU, XIN;WU, JIA;REEL/FRAME:030497/0568

Effective date: 20130521

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION